Analysis
-
max time kernel
132s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 00:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bfb3ebdd4b0e3ebc0b91d0b72fa4f60c_JaffaCakes118.dll
Resource
win7-20240705-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bfb3ebdd4b0e3ebc0b91d0b72fa4f60c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
bfb3ebdd4b0e3ebc0b91d0b72fa4f60c_JaffaCakes118.dll
-
Size
3KB
-
MD5
bfb3ebdd4b0e3ebc0b91d0b72fa4f60c
-
SHA1
8f6981cbadaea4f2eb9cc6a7bff250d61d4358b5
-
SHA256
719a50ed7508cfb9d69884b4f7c855a26445e0dfade4a6a231c924c8529e3293
-
SHA512
9971d29a14184b1537a58109bc10c191aca225444688f54432f1cdc80b9193129b471e7a811f83e62a708a775e08926f52099221a523d4efd2154a7d9766864c
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3328 2652 rundll32.exe 84 PID 2652 wrote to memory of 3328 2652 rundll32.exe 84 PID 2652 wrote to memory of 3328 2652 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfb3ebdd4b0e3ebc0b91d0b72fa4f60c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfb3ebdd4b0e3ebc0b91d0b72fa4f60c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3328
-